共 50 条
- [22] Towards Reproducible Cyber-Security Research through Complex Node Automation [J]. 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
- [23] Application of a Robust Control Algorithm for Satellite Cyber-Security and System Resilience [J]. 2017 IEEE AEROSPACE CONFERENCE, 2017,
- [24] Short Paper Data Log Management for Cyber-Security Programmability of Cloud Services and Applications [J]. PROCEEDINGS OF THE 1ST ACM WORKSHOP ON WORKSHOP ON CYBER-SECURITY ARMS RACE (CYSARM '19), 2019, : 47 - 52
- [25] The World "Wild" Web: Cyber-Security Intelligence Gathering Opportunities from the "Dark" Side [J]. LISS 2013, 2015, : 1265 - 1270
- [26] Mean-Field-Game Model for Botnet Defense in Cyber-Security [J]. Applied Mathematics & Optimization, 2016, 74 : 669 - 692
- [27] Toward Cyber-Security Architecture Framework for Developping Countries: An Assessment Model [J]. ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 538 : 652 - 658
- [28] Towards Developing a formal model for tracking Cyber-Security Investments in Jamaica [J]. SOUTHEASTCON 2023, 2023, : 883 - 888